poppopjmp / spiderfootLinks
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. Codename Mirage
☆99Updated 2 weeks ago
Alternatives and similar repositories for spiderfoot
Users that are interested in spiderfoot are comparing it to the libraries listed below
Sorting:
- Capture screenshots of onion services on an onion service.☆72Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆141Updated 2 years ago
- Tor onion address lookup☆55Updated last month
- A meta-list of public references to threat actor profiles and APT group datasets.☆69Updated 3 months ago
- A Linkedin Activity date Finder☆56Updated 5 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆89Updated 4 months ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆163Updated last year
- All-sources tool to search websites by favicons☆172Updated 10 months ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆57Updated last week
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 6 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆53Updated last week
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆106Updated 2 years ago
- ☆55Updated 8 months ago
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆55Updated 2 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Sniffing out well-known threat groups☆61Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 7 months ago
- Just some lists of Malware Configs☆172Updated 8 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆25Updated 2 weeks ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆56Updated 2 months ago
- A repository of credential stealer formats☆227Updated 3 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆136Updated this week
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆133Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆61Updated last month
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆69Updated 6 months ago
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆213Updated 4 months ago
- ☆149Updated 2 years ago
- 🕵️ Email osint tool☆62Updated 2 years ago